TRANSITIONING FROM SOURCE INSTRUCTION SET ARCHITECTURE (ISA) CODE TO TRANSLATED CODE IN A PARTIAL EMULATION ENVIRONMENT
    3.
    发明申请
    TRANSITIONING FROM SOURCE INSTRUCTION SET ARCHITECTURE (ISA) CODE TO TRANSLATED CODE IN A PARTIAL EMULATION ENVIRONMENT 有权
    从源代码指令体系结构(ISA)转换为部分模拟环境中的转换代码

    公开(公告)号:US20130198458A1

    公开(公告)日:2013-08-01

    申请号:US13785561

    申请日:2013-03-05

    CPC classification number: G06F9/3017 G06F9/455 G06F12/0873 G06F12/0875

    Abstract: In one embodiment, a processor can operate in multiple modes, including a direct execution mode and an emulation execution mode. More specifically, the processor may operate in a partial emulation model in which source instruction set architecture (ISA) instructions are directly handled in the direct execution mode and translated code generated by an emulation engine is handled in the emulation execution mode. Embodiments may also provide for efficient transitions between the modes using information that can be stored in one or more storages of the processor and elsewhere in a system. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,处理器可以在多种模式下操作,包括直接执行模式和仿真执行模式。 更具体地,处理器可以在部分仿真模型中操作,其中以直接执行模式直接处理源指令集架构(ISA)指令,并且在仿真执行模式中处理由仿真引擎生成的转换代码。 实施例还可以使用可以存储在处理器的一个或多个存储器和系统中的其他地方的信息来提供模式之间的有效转换。 描述和要求保护其他实施例。

    METHODS AND APPARATUS TO MANAGE OBJECT LOCKS
    7.
    发明申请
    METHODS AND APPARATUS TO MANAGE OBJECT LOCKS 有权
    管理对象锁的方法和设备

    公开(公告)号:US20110153992A1

    公开(公告)日:2011-06-23

    申请号:US12645668

    申请日:2009-12-23

    Abstract: Example methods and apparatus to manage object locks are disclosed. A disclosed example method includes receiving an object lock request from a processor, the lock request associated with object lock code to lock an object, and generating object lock-bypass code based on a type of the processor, the object lock-bypass code to execute in a managed runtime in response to receiving the object lock request. The example method also includes identifying a type of instruction set architecture (ISA) associated with the processor, invoking a checkpoint instruction for the processor based on the identified ISA, suspending the object lock code from executing and executing target code when the object is uncontended, and allowing the object lock code to execute when the object is contended.

    Abstract translation: 公开了用于管理对象锁的示例性方法和装置。 所公开的示例性方法包括从处理器接收对象锁定请求,与对象锁定代码相关联的锁定请求以锁定对象,以及基于处理器的类型生成对象锁定旁路代码,执行对象锁定旁路代码 在受管运行时响应于接收到对象锁定请求。 示例性方法还包括识别与处理器相关联的指令集架构(ISA)的类型,基于所识别的ISA调用处理器的检查点指令,当对象不受约束时暂停对象锁定代码执行和执行目标代码, 并允许对象锁定代码在对象被竞争时执行。

    Identifying delinquent object chains in a managed run time environment
    8.
    发明申请
    Identifying delinquent object chains in a managed run time environment 审中-公开
    在受管理的运行时环境中识别违规对象链

    公开(公告)号:US20070156967A1

    公开(公告)日:2007-07-05

    申请号:US11321133

    申请日:2005-12-29

    CPC classification number: G06F12/0862 G06F12/0253 G06F2212/6024

    Abstract: In one embodiment, an object oriented programming language can pre-fetch objects and fields within those objects to a cache memory. A hardware performance monitor can be used to identify loads that read from an address that is frequently absent from a memory. Instrumentation can be used to mark the objects that include the frequently missed address. A compiler can identify chains of objects that are frequently absent from memory. The chains of objects can be pre-fetched without regard to the types of object. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,面向对象的编程语言可以将这些对象内的对象和字段预取到高速缓冲存储器。 可以使用硬件性能监视器来识别从存储器中经常缺少的地址读取的加载。 仪器可用于标记包含经常错过的地址的对象。 编译器可以识别经常在内存中不存在的对象链。 可以预取对象的链,而不考虑对象的类型。 描述和要求保护其他实施例。

    ANALYZING POTENTIAL BENEFITS OF VECTORIZATION
    10.
    发明申请
    ANALYZING POTENTIAL BENEFITS OF VECTORIZATION 有权
    分析潜在收益的潜在优势

    公开(公告)号:US20140258677A1

    公开(公告)日:2014-09-11

    申请号:US13997140

    申请日:2013-03-05

    CPC classification number: G06F8/41 G06F8/456

    Abstract: Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media (transitory and non-transitory) are described herein for analyzing execution of a plurality of executable instructions and, based on the analysis, providing an indication of a benefit to be obtained by vectorization of at least a subset of the plurality of executable instructions. In various embodiments, the analysis may include identification of the subset of the plurality of executable instructions suitable for conversion to one or more single-instruction multiple-data (“SIMD”) instructions.

    Abstract translation: 本文描述了计算机实现的方法,系统,计算设备和计算机可读介质(暂时性和非暂时性)的实施例,用于分析多个可执行指令的执行,并且基于该分析,提供对 可以通过对多个可执行指令的至少一个子集进行向量化来获得。 在各种实施例中,分析可以包括识别适合于转换成一个或多个单指令多数据(“SIMD”)指令的多个可执行指令的子集。

Patent Agency Ranking